Analysis
-
max time kernel
130s -
max time network
134s -
platform
windows7_x64 -
resource
win7v20210408 -
submitted
05-05-2021 10:07
Static task
static1
Behavioral task
behavioral1
Sample
d331a53d_by_Libranalysis.exe
Resource
win7v20210408
Behavioral task
behavioral2
Sample
d331a53d_by_Libranalysis.exe
Resource
win10v20210410
General
-
Target
d331a53d_by_Libranalysis.exe
-
Size
118KB
-
MD5
d331a53d6deced27e44a1b23a897c660
-
SHA1
a96d6f7f562943794a632b7071c2bc228477ed6f
-
SHA256
29051e0cdfd29405d4766b2d09e93c03b190fc71d094d11fb0e7bc998187689d
-
SHA512
632b1a37d395a9dad7e2ac1c47007b98c877f187ecf564935fa1cb9062ceed13eacd98cc9782e815d616c204e38e9c3bef43f4223c3f69a4b94562e899543a18
Malware Config
Signatures
-
ACProtect 1.3x - 1.4x DLL software 3 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule \Windows\SysWOW64\shervans.dll acprotect C:\Windows\SysWOW64\shervans.dll acprotect \Windows\SysWOW64\shervans.dll acprotect -
Executes dropped EXE 2 IoCs
Processes:
ctfmen.exesmnss.exepid process 1760 ctfmen.exe 1616 smnss.exe -
Loads dropped DLL 9 IoCs
Processes:
d331a53d_by_Libranalysis.exectfmen.exesmnss.exeWerFault.exepid process 1828 d331a53d_by_Libranalysis.exe 1828 d331a53d_by_Libranalysis.exe 1828 d331a53d_by_Libranalysis.exe 1760 ctfmen.exe 1760 ctfmen.exe 1616 smnss.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
smnss.exed331a53d_by_Libranalysis.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" smnss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ctfmen = "C:\\Windows\\system32\\ctfmen.exe" d331a53d_by_Libranalysis.exe -
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
smnss.exed331a53d_by_Libranalysis.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 smnss.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\1 smnss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum d331a53d_by_Libranalysis.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 d331a53d_by_Libranalysis.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\1 d331a53d_by_Libranalysis.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum smnss.exe -
Drops file in System32 directory 12 IoCs
Processes:
d331a53d_by_Libranalysis.exesmnss.exedescription ioc process File created C:\Windows\SysWOW64\smnss.exe d331a53d_by_Libranalysis.exe File created C:\Windows\SysWOW64\zipfi.dll smnss.exe File created C:\Windows\SysWOW64\zipfiaq.dll smnss.exe File created C:\Windows\SysWOW64\ctfmen.exe d331a53d_by_Libranalysis.exe File opened for modification C:\Windows\SysWOW64\ctfmen.exe d331a53d_by_Libranalysis.exe File created C:\Windows\SysWOW64\grcopy.dll d331a53d_by_Libranalysis.exe File opened for modification C:\Windows\SysWOW64\grcopy.dll d331a53d_by_Libranalysis.exe File opened for modification C:\Windows\SysWOW64\shervans.dll d331a53d_by_Libranalysis.exe File created C:\Windows\SysWOW64\smnss.exe smnss.exe File created C:\Windows\SysWOW64\shervans.dll d331a53d_by_Libranalysis.exe File created C:\Windows\SysWOW64\satornas.dll d331a53d_by_Libranalysis.exe File opened for modification C:\Windows\SysWOW64\satornas.dll d331a53d_by_Libranalysis.exe -
Drops file in Program Files directory 64 IoCs
Processes:
smnss.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\fr.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\fy.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ga.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\mk.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\fa.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\base_kor.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\osknumpad.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\bg.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\hy.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\kab.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-tw.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\zh-changjei.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipscsy.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipskor.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsrus.xml smnss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\THIRDPARTYLICENSEREADME.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskmenu\oskmenubase.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm smnss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\README-JDK.html smnss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\RELEASE-NOTES.html smnss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\README.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\oskpred\oskpredbase.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\web.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsnld.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm smnss.exe File opened for modification C:\Program Files\DVD Maker\Shared\Filters.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\es.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\gu.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\lv.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\sv.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\tt.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\lij.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\Alphabet.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsdan.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrb.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\id.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\lt.txt smnss.exe File opened for modification C:\Program Files\7-Zip\License.txt smnss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\server\Xusage.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\kaa.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\uz.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipsen.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssrl.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ky.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\ms.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\pa-in.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\vi.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\auxpad\auxbase.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\keypad.xml smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\fsdefinitions\main\baseAltGr_rtl.xml smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\sk.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\th.txt smnss.exe File opened for modification C:\Program Files\7-Zip\readme.txt smnss.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\lib\jvm.hprof.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\bn.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\sa.txt smnss.exe File opened for modification C:\Program Files\7-Zip\Lang\yo.txt smnss.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\ipssve.xml smnss.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1640 1616 WerFault.exe smnss.exe -
Modifies registry class 6 IoCs
Processes:
smnss.exed331a53d_by_Libranalysis.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32\ = "C:\\Windows\\SysWow64\\shervans.dll" smnss.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32 d331a53d_by_Libranalysis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node d331a53d_by_Libranalysis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID d331a53d_by_Libranalysis.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED} d331a53d_by_Libranalysis.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{E6FB5E20-DE35-11CF-9C87-00AA005127ED}\InprocServer32\ = "C:\\Windows\\SysWow64\\shervans.dll" d331a53d_by_Libranalysis.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
WerFault.exepid process 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe 1640 WerFault.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
WerFault.exepid process 1640 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
smnss.exeWerFault.exedescription pid process Token: SeDebugPrivilege 1616 smnss.exe Token: SeDebugPrivilege 1640 WerFault.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
d331a53d_by_Libranalysis.exectfmen.exesmnss.exedescription pid process target process PID 1828 wrote to memory of 1760 1828 d331a53d_by_Libranalysis.exe ctfmen.exe PID 1828 wrote to memory of 1760 1828 d331a53d_by_Libranalysis.exe ctfmen.exe PID 1828 wrote to memory of 1760 1828 d331a53d_by_Libranalysis.exe ctfmen.exe PID 1828 wrote to memory of 1760 1828 d331a53d_by_Libranalysis.exe ctfmen.exe PID 1760 wrote to memory of 1616 1760 ctfmen.exe smnss.exe PID 1760 wrote to memory of 1616 1760 ctfmen.exe smnss.exe PID 1760 wrote to memory of 1616 1760 ctfmen.exe smnss.exe PID 1760 wrote to memory of 1616 1760 ctfmen.exe smnss.exe PID 1616 wrote to memory of 1640 1616 smnss.exe WerFault.exe PID 1616 wrote to memory of 1640 1616 smnss.exe WerFault.exe PID 1616 wrote to memory of 1640 1616 smnss.exe WerFault.exe PID 1616 wrote to memory of 1640 1616 smnss.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d331a53d_by_Libranalysis.exe"C:\Users\Admin\AppData\Local\Temp\d331a53d_by_Libranalysis.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ctfmen.exectfmen.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\smnss.exeC:\Windows\system32\smnss.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1616 -s 7924⤵
- Loads dropped DLL
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\ctfmen.exeMD5
abb0069b9f9c58771dc592b81760a612
SHA1d86a9eb3a8e6102a51cab07d22ded53c15dd2eb1
SHA2565ea4b40048935786c43b2029b1ab9c132fee1ce5ad62060a46438c4db0d9274a
SHA51221e9cbbc18587b52ad35cbdc1cb80e899f009ce4116646e617476afe3a9fe496440fef7e12fc8eb5ece80f164bf24e5e1371a224b45ebea76b5bfdd2ffa6f779
-
C:\Windows\SysWOW64\grcopy.dllMD5
4fba759b8bd2c358742eb54f3152b74b
SHA172cc81064ac1e45ce58a4e42dc79dce7b5fa3b63
SHA25668b9a560a563b6b4ac0593ce853f6fb7d6901f52d9b0835724e408a9ad7a6112
SHA51273153652cd5822368333c1a91c4ed91c60c76d32c98726630cb5e19388b2d762e301057da9f5b548ebe368515243b1de00af4a5f17cede2e75664c7079ceee51
-
C:\Windows\SysWOW64\satornas.dllMD5
5461c2842913ced3e1619500ab1922b7
SHA16dfdaab76d40d89eaa2c040817212d0037956104
SHA256019c21e7818c597f868cf9d564c324db4ff8c0c802ec7eb410314237a92a3c54
SHA5123ccdadeff7feb3425cb883f21cc8ee7e65824939913fc37fc7cf6f9217e95f7f01927b08407d65c53b2b0193f9f70a42252a92e831850845d7ecada6b5fe1875
-
C:\Windows\SysWOW64\shervans.dllMD5
6f386cfeb505b0adb9f2dd8450be1687
SHA1437b6c20fe99ef21968d727056851ee4642bd4cd
SHA256b1e9eac42a8576adc7fe854561c5514c70c6d8470ba6fe7a02499cdd148292f6
SHA51225139cd904277fce7584b6a1bccfb9d817df4b28accb059149eb13f1a9ed7743b711420c97dd708e0df08c3b10457c6e6df6ad88a2f8a9c46eee646f00091763
-
C:\Windows\SysWOW64\smnss.exeMD5
4fba759b8bd2c358742eb54f3152b74b
SHA172cc81064ac1e45ce58a4e42dc79dce7b5fa3b63
SHA25668b9a560a563b6b4ac0593ce853f6fb7d6901f52d9b0835724e408a9ad7a6112
SHA51273153652cd5822368333c1a91c4ed91c60c76d32c98726630cb5e19388b2d762e301057da9f5b548ebe368515243b1de00af4a5f17cede2e75664c7079ceee51
-
C:\Windows\SysWOW64\smnss.exeMD5
4fba759b8bd2c358742eb54f3152b74b
SHA172cc81064ac1e45ce58a4e42dc79dce7b5fa3b63
SHA25668b9a560a563b6b4ac0593ce853f6fb7d6901f52d9b0835724e408a9ad7a6112
SHA51273153652cd5822368333c1a91c4ed91c60c76d32c98726630cb5e19388b2d762e301057da9f5b548ebe368515243b1de00af4a5f17cede2e75664c7079ceee51
-
\Windows\SysWOW64\ctfmen.exeMD5
abb0069b9f9c58771dc592b81760a612
SHA1d86a9eb3a8e6102a51cab07d22ded53c15dd2eb1
SHA2565ea4b40048935786c43b2029b1ab9c132fee1ce5ad62060a46438c4db0d9274a
SHA51221e9cbbc18587b52ad35cbdc1cb80e899f009ce4116646e617476afe3a9fe496440fef7e12fc8eb5ece80f164bf24e5e1371a224b45ebea76b5bfdd2ffa6f779
-
\Windows\SysWOW64\ctfmen.exeMD5
abb0069b9f9c58771dc592b81760a612
SHA1d86a9eb3a8e6102a51cab07d22ded53c15dd2eb1
SHA2565ea4b40048935786c43b2029b1ab9c132fee1ce5ad62060a46438c4db0d9274a
SHA51221e9cbbc18587b52ad35cbdc1cb80e899f009ce4116646e617476afe3a9fe496440fef7e12fc8eb5ece80f164bf24e5e1371a224b45ebea76b5bfdd2ffa6f779
-
\Windows\SysWOW64\shervans.dllMD5
6f386cfeb505b0adb9f2dd8450be1687
SHA1437b6c20fe99ef21968d727056851ee4642bd4cd
SHA256b1e9eac42a8576adc7fe854561c5514c70c6d8470ba6fe7a02499cdd148292f6
SHA51225139cd904277fce7584b6a1bccfb9d817df4b28accb059149eb13f1a9ed7743b711420c97dd708e0df08c3b10457c6e6df6ad88a2f8a9c46eee646f00091763
-
\Windows\SysWOW64\shervans.dllMD5
6f386cfeb505b0adb9f2dd8450be1687
SHA1437b6c20fe99ef21968d727056851ee4642bd4cd
SHA256b1e9eac42a8576adc7fe854561c5514c70c6d8470ba6fe7a02499cdd148292f6
SHA51225139cd904277fce7584b6a1bccfb9d817df4b28accb059149eb13f1a9ed7743b711420c97dd708e0df08c3b10457c6e6df6ad88a2f8a9c46eee646f00091763
-
\Windows\SysWOW64\smnss.exeMD5
4fba759b8bd2c358742eb54f3152b74b
SHA172cc81064ac1e45ce58a4e42dc79dce7b5fa3b63
SHA25668b9a560a563b6b4ac0593ce853f6fb7d6901f52d9b0835724e408a9ad7a6112
SHA51273153652cd5822368333c1a91c4ed91c60c76d32c98726630cb5e19388b2d762e301057da9f5b548ebe368515243b1de00af4a5f17cede2e75664c7079ceee51
-
\Windows\SysWOW64\smnss.exeMD5
4fba759b8bd2c358742eb54f3152b74b
SHA172cc81064ac1e45ce58a4e42dc79dce7b5fa3b63
SHA25668b9a560a563b6b4ac0593ce853f6fb7d6901f52d9b0835724e408a9ad7a6112
SHA51273153652cd5822368333c1a91c4ed91c60c76d32c98726630cb5e19388b2d762e301057da9f5b548ebe368515243b1de00af4a5f17cede2e75664c7079ceee51
-
\Windows\SysWOW64\smnss.exeMD5
4fba759b8bd2c358742eb54f3152b74b
SHA172cc81064ac1e45ce58a4e42dc79dce7b5fa3b63
SHA25668b9a560a563b6b4ac0593ce853f6fb7d6901f52d9b0835724e408a9ad7a6112
SHA51273153652cd5822368333c1a91c4ed91c60c76d32c98726630cb5e19388b2d762e301057da9f5b548ebe368515243b1de00af4a5f17cede2e75664c7079ceee51
-
\Windows\SysWOW64\smnss.exeMD5
4fba759b8bd2c358742eb54f3152b74b
SHA172cc81064ac1e45ce58a4e42dc79dce7b5fa3b63
SHA25668b9a560a563b6b4ac0593ce853f6fb7d6901f52d9b0835724e408a9ad7a6112
SHA51273153652cd5822368333c1a91c4ed91c60c76d32c98726630cb5e19388b2d762e301057da9f5b548ebe368515243b1de00af4a5f17cede2e75664c7079ceee51
-
\Windows\SysWOW64\smnss.exeMD5
4fba759b8bd2c358742eb54f3152b74b
SHA172cc81064ac1e45ce58a4e42dc79dce7b5fa3b63
SHA25668b9a560a563b6b4ac0593ce853f6fb7d6901f52d9b0835724e408a9ad7a6112
SHA51273153652cd5822368333c1a91c4ed91c60c76d32c98726630cb5e19388b2d762e301057da9f5b548ebe368515243b1de00af4a5f17cede2e75664c7079ceee51
-
memory/1616-72-0x0000000075511000-0x0000000075513000-memory.dmpFilesize
8KB
-
memory/1616-68-0x0000000000000000-mapping.dmp
-
memory/1640-75-0x0000000000000000-mapping.dmp
-
memory/1640-79-0x0000000000450000-0x0000000000451000-memory.dmpFilesize
4KB
-
memory/1760-63-0x0000000000000000-mapping.dmp